Syllabus |
- Introduction To Cyber Laws
- Symmetric And Asymmetric Key Cryptography
- Data Integrity Algorithms And Security Requirements
- Legal, Ethical, And Professional Issues In Information Security
- Risk Management
- Tools And Methods Used In Cybercrime
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls, and Honeypots
- Cloud Computing
- Cryptography
|